Jansen van Vuuren, JCLeenen, LZaaiman, JJ2015-02-092015-02-092014-03Jansen van Vuuren, J.C, Leenen, L and Zaaiman, J.J. 2014. Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa. In: 9th International Conference on Cyber Warfare and Security, 2014, Purdue University, West Lafayette, Indiana, USA, 24-25 March 2014http://hdl.handle.net/10204/78699th International Conference on Cyber Warfare and Security, 2014, Purdue University, West Lafayette, Indiana, USA, 24-25 March 2014Many developing countries are particularly vulnerable to cyber security threats due to an enormous growth in Internet connectivity rates over the past decade. The South African government approved a draft version of its National Cybersecurity Policy Framework in March 2012. Although implementation of this policy has been initiated in a few isolated instances, a holistic approach is lacking. Due to the cybersecurity environment not being clearly bounded and defined, it is very difficult to put forward a National Cybersecurity Policy Framework that is easy to understand and implement. In this paper, the authors motivate that an ontology can assist in defining a model that describes the relationships between different stakeholders and cybersecurity components that are relevant in the policy implementation. An ontology is a technology that enables an encoded, shareable vocabulary and domain model and it has powerful automated reasoning abilities. This methodology can contribute to a more holistic approach for the implementation of the South African National Cybersecurity policy. The Extended Cyber Security Toolkit (XCyberST) (Jansen van Vuuren, Leenen, Phahlamohlaka, & Zaaiman 2013) as the basis for mapping cybersecurity entities to functions, was the initial attempt to model the national cybersecurity policy environment in South Africa. The authors proposed the use of an ontological model for the cybersecurity policy implementation in a previous paper (Grobler, van Vuuren, & Leenen 2012), and this model is now presented. The model is partially based on information in the XCyberST and implemented in Protégé, an ontology editor. Although this model has been developed for the South African cybersecurity environment, it can easily be adapted to be used in other countries.enSouth African cyber securityCybersecurity toolkitPolice implementationOntologiesNational cybersecurity policy frameworkUsing an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South AfricaConference PresentationJansen van Vuuren, J., Leenen, L., & Zaaiman, J. (2014). Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa. http://hdl.handle.net/10204/7869Jansen van Vuuren, JC, L Leenen, and JJ Zaaiman. "Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa." (2014): http://hdl.handle.net/10204/7869Jansen van Vuuren J, Leenen L, Zaaiman J, Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa; 2014. http://hdl.handle.net/10204/7869 .TY - Conference Presentation AU - Jansen van Vuuren, JC AU - Leenen, L AU - Zaaiman, JJ AB - Many developing countries are particularly vulnerable to cyber security threats due to an enormous growth in Internet connectivity rates over the past decade. The South African government approved a draft version of its National Cybersecurity Policy Framework in March 2012. Although implementation of this policy has been initiated in a few isolated instances, a holistic approach is lacking. Due to the cybersecurity environment not being clearly bounded and defined, it is very difficult to put forward a National Cybersecurity Policy Framework that is easy to understand and implement. In this paper, the authors motivate that an ontology can assist in defining a model that describes the relationships between different stakeholders and cybersecurity components that are relevant in the policy implementation. An ontology is a technology that enables an encoded, shareable vocabulary and domain model and it has powerful automated reasoning abilities. This methodology can contribute to a more holistic approach for the implementation of the South African National Cybersecurity policy. The Extended Cyber Security Toolkit (XCyberST) (Jansen van Vuuren, Leenen, Phahlamohlaka, & Zaaiman 2013) as the basis for mapping cybersecurity entities to functions, was the initial attempt to model the national cybersecurity policy environment in South Africa. The authors proposed the use of an ontological model for the cybersecurity policy implementation in a previous paper (Grobler, van Vuuren, & Leenen 2012), and this model is now presented. The model is partially based on information in the XCyberST and implemented in Protégé, an ontology editor. Although this model has been developed for the South African cybersecurity environment, it can easily be adapted to be used in other countries. DA - 2014-03 DB - ResearchSpace DP - CSIR KW - South African cyber security KW - Cybersecurity toolkit KW - Police implementation KW - Ontologies KW - National cybersecurity policy framework LK - https://researchspace.csir.co.za PY - 2014 T1 - Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa TI - Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa UR - http://hdl.handle.net/10204/7869 ER -